<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Security Forem: Dinesh Dawonauth</title>
    <description>The latest articles on Security Forem by Dinesh Dawonauth (@dineshgit17).</description>
    <link>https://zeroday.forem.com/dineshgit17</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3672643%2F0bc3d3fc-3f22-46b8-abd7-26f99508f49e.jpeg</url>
      <title>Security Forem: Dinesh Dawonauth</title>
      <link>https://zeroday.forem.com/dineshgit17</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://zeroday.forem.com/feed/dineshgit17"/>
    <language>en</language>
    <item>
      <title>I Over-Engineered My Portfolio Into an Operating System</title>
      <dc:creator>Dinesh Dawonauth</dc:creator>
      <pubDate>Wed, 14 Jan 2026 13:49:33 +0000</pubDate>
      <link>https://zeroday.forem.com/dineshgit17/i-over-engineered-my-portfolio-into-an-operating-system-2ggm</link>
      <guid>https://zeroday.forem.com/dineshgit17/i-over-engineered-my-portfolio-into-an-operating-system-2ggm</guid>
      <description>&lt;p&gt;&lt;em&gt;This is a submission for the &lt;a href="https://dev.to/challenges/new-year-new-you-google-ai-2025-12-31"&gt;New Year, New You Portfolio Challenge Presented by Google AI&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  About Me
&lt;/h2&gt;

&lt;p&gt;Most portfolios say "attention to detail" somewhere in the copy but then you view source and find inline styles and console errors.&lt;/p&gt;

&lt;p&gt;I'm a Data Engineer in Toronto and I wanted a portfolio that proved the claims instead of making them. So I built something that either works flawlessly or exposes me as a fraud. High stakes. Good motivation.&lt;/p&gt;

&lt;h2&gt;
  
  
  Portfolio
&lt;/h2&gt;

&lt;p&gt;

&lt;/p&gt;
&lt;div class="ltag__cloud-run"&gt;
  &lt;iframe height="600px" src="https://focus-os-420486843370.us-central1.run.app"&gt;
  &lt;/iframe&gt;
&lt;/div&gt;




&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;NOTE:&lt;/strong&gt; Debate Lab and Yield cannot run inside an embedded iframe.&lt;br&gt;&lt;br&gt;
Cross-frame rendering is intentionally disabled to mitigate &lt;strong&gt;clickjacking&lt;/strong&gt; and other UI-redress attacks.&lt;br&gt;&lt;br&gt;
For the full, secure experience, visit &lt;a href="https://www.dineshd.dev" rel="noopener noreferrer"&gt;dineshd.dev&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  How I Built It
&lt;/h2&gt;

&lt;p&gt;The site is a desktop operating system running in the browser. Boot sequence, window management, dock, terminal. Every page is an app that opens in a draggable, resizable window.&lt;/p&gt;

&lt;p&gt;Tech Stack: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Next.js 16, React 19, TypeScript in strict mode&lt;/li&gt;
&lt;li&gt;Tailwind CSS v4, Framer Motion, Zustand&lt;/li&gt;
&lt;li&gt;Vitest for testing&lt;/li&gt;
&lt;li&gt;Google Cloud Run&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Architecture
&lt;/h2&gt;

&lt;p&gt;I separated concerns the way actual operating systems do. The &lt;code&gt;os&lt;/code&gt; layer handles windows, the dock, the desktop. The &lt;code&gt;apps&lt;/code&gt; layer contains applications. Apps never import from OS internals. This keeps things clean. I can add new apps without touching window management. I can refactor the dock without breaking the terminal.&lt;/p&gt;

&lt;h2&gt;
  
  
  Infrastructure:
&lt;/h2&gt;

&lt;p&gt;Six CI workflows run on every PR. Build, test, security audit, link checking, bundle size monitoring. Nothing merges without passing all of them.&lt;/p&gt;

&lt;p&gt;Lighthouse scores sit above 90 across the board. On a site with drag physics, iframe embeds, and boot animations. It took effort.&lt;/p&gt;

&lt;h2&gt;
  
  
  How Gemini Fit Into the Process
&lt;/h2&gt;

&lt;p&gt;I used Gemini throughout for planning and structure. Not to write code. To think.&lt;/p&gt;

&lt;p&gt;"Window management" sounds like one feature until you start listing edge cases. Drag boundaries. Resize constraints. Z-index stacking. Focus transfer on close. Minimize and restore state. It sprawls fast.&lt;/p&gt;

&lt;p&gt;I'd describe a feature area to Gemini and ask it to break things down into epics. Here's a trimmed version of the prompt I used:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;You are a Senior Product Manager with technical fluency 
in modern web applications (Next.js / React).

Convert identified feature areas into well-scoped PM epics 
suitable for an engineering backlog.

For each epic:
- Title and goal
- Scope boundaries
- Stories with acceptance criteria
- Implementation order with rationale
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Gemini returned structured epics with stories, acceptance criteria, and sequencing. Ready to drop into Notion.&lt;/p&gt;

&lt;p&gt;Same approach for testing plans. Describe a component, get back coverage for happy paths, edge cases, failure modes. Review, adjust, execute.&lt;/p&gt;

&lt;p&gt;The real value was upstream. Articulating a feature clearly enough for Gemini to understand it forced me to actually understand it. Half the bugs I avoided were caught in the prompting phase.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I'm Most Proud Of
&lt;/h2&gt;

&lt;p&gt;The terminal works. Not a fake CLI that prints strings. Real command parsing. &lt;code&gt;ls&lt;/code&gt;, &lt;code&gt;pwd&lt;/code&gt;, &lt;code&gt;whoami&lt;/code&gt;, &lt;code&gt;help&lt;/code&gt;. Easter eggs I won't spoil here.&lt;/p&gt;

&lt;p&gt;Projects run inside the portfolio. My other apps open as windows. Visitors don't leave the site to see my work. They use it in context.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The invisible stuff&lt;/strong&gt;: Keyboard navigation. Screen reader support. Reduced motion respected. Accessibility was a constraint from the start, not a box I checked later.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The over engineering was the point.&lt;/strong&gt; Anyone can claim production ready code. Showing a GitHub repo with CI pipelines, test coverage, and passing accessibility audits is harder to fake.&lt;/p&gt;

&lt;p&gt;Open some windows. Drag them around. Try the terminal.&lt;br&gt;
If it breaks, that's on me.&lt;/p&gt;

</description>
      <category>devchallenge</category>
      <category>googleaichallenge</category>
      <category>portfolio</category>
      <category>gemini</category>
    </item>
    <item>
      <title>I Over Engineered My Portfolio Into an Operating System. No Regrets.</title>
      <dc:creator>Dinesh Dawonauth</dc:creator>
      <pubDate>Tue, 13 Jan 2026 23:31:37 +0000</pubDate>
      <link>https://zeroday.forem.com/dineshgit17/i-over-engineered-my-portfolio-into-an-operating-system-no-regrets-e52</link>
      <guid>https://zeroday.forem.com/dineshgit17/i-over-engineered-my-portfolio-into-an-operating-system-no-regrets-e52</guid>
      <description>&lt;p&gt;It all started as a landing page. Hero section, project cards, a contact form. The kind of portfolio every bootcamp graduate ships in a weekend.&lt;br&gt;
Then I added a dock. Then window management. Then a terminal with easter eggs. Then a boot sequence. Then CI/CD pipelines and unit tests.&lt;br&gt;
Somewhere along the way, my portfolio became an operating system.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Though
&lt;/h2&gt;

&lt;p&gt;I'm a Data Engineer trying to prove I can build visually stunning, functional frontends. "I know React" doesn't cut it anymore in a world full of AI slop websites. Everyone knows React.&lt;br&gt;
So I asked myself a different question, what if my portfolio didn't just list my skills but actually showcased them?&lt;br&gt;
Not a static page that says "I'm good at UI/UX". But, an actual interface that proves it.&lt;br&gt;
Not bullet points about "attention to detail", a boot sequence that nails the timing down to the millisecond.&lt;br&gt;
Not claims about "production ready code" but a GitHub repo with CI/CD, unit tests and Lighthouse scores above 90 (crazy for a portfolio built like an OS with lots of moving parts)&lt;br&gt;
The over engineering wasn't scope creep. It was the point.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I Built
&lt;/h2&gt;

&lt;p&gt;When you land on the site you see a desktop. Wallpaper, dock at the bottom, status bar with a clock. Every page is an app that opens in a draggable, resizable window. Minimize, maximize, close. It all works.&lt;/p&gt;

&lt;p&gt;The dock has Mac OS style magnification on hover. Icons that bounce when clicked. The terminal accepts real commands with easter eggs (I'll let you find that out for yourself 😄)&lt;/p&gt;

&lt;p&gt;And here's the part I'm proudest of- My actual projects run inside the portfolio as embedded apps. Visitors don't leave to see my work. They experience it in context.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Stuff Nobody Sees
&lt;/h2&gt;

&lt;p&gt;This is what separates side projects from production apps.&lt;/p&gt;

&lt;p&gt;The GitHub repo has six CI workflows: build, test, security audit, link checking, bundle size monitoring. &lt;br&gt;
Every PR needs green across the board.&lt;/p&gt;

&lt;p&gt;Yes, I wrote unit tests for a portfolio site. The critical paths covered are window management, focus handling, and preference persistence.&lt;/p&gt;

&lt;p&gt;Lighthouse scores are 90+ across the board. On a site running a window manager with drag physics and iframe embeds.&lt;br&gt;
Accessibility? Screen reader compatible, keyboard navigable, reduced motion respected. Not an afterthought.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Takeaway
&lt;/h2&gt;

&lt;p&gt;Your portfolio is a product. Treat it like one.&lt;/p&gt;

&lt;p&gt;"I know React" is forgettable. "I built an entire operating system in React" starts conversations.&lt;/p&gt;

&lt;p&gt;If you want to play around 👉🏽 &lt;a href="https://www.dineshd.dev" rel="noopener noreferrer"&gt;dineshd.dev&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Open some windows. Try the terminal. Find the easter eggs.&lt;br&gt;
And if you've ever over engineered a side project just to prove you could, drop it in the comments! &lt;/p&gt;

&lt;p&gt;P.S. Yes, it works on mobile. No I won't be taking questions about my life choices 🤫&lt;/p&gt;

</description>
      <category>react</category>
      <category>webdev</category>
      <category>javascript</category>
      <category>career</category>
    </item>
    <item>
      <title>Looking for feedback on a small side project I’ve been building</title>
      <dc:creator>Dinesh Dawonauth</dc:creator>
      <pubDate>Mon, 22 Dec 2025 18:39:06 +0000</pubDate>
      <link>https://zeroday.forem.com/dineshgit17/looking-for-feedback-on-a-small-side-project-ive-been-building-23i7</link>
      <guid>https://zeroday.forem.com/dineshgit17/looking-for-feedback-on-a-small-side-project-ive-been-building-23i7</guid>
      <description>&lt;p&gt;I’ve been spending nights and weekends hacking on a side project and figured it was time to put it in front of other developers and get some real feedback.&lt;/p&gt;

&lt;p&gt;The project is called PassFX. It’s a terminal-based password manager that works entirely offline. No cloud sync, no browser extensions, no accounts. Everything lives locally and is encrypted with a single master passphrase.&lt;/p&gt;

&lt;p&gt;I didn’t build this to compete with existing password managers. This was more about exploring a specific idea:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;What does a minimal, auditable, developer-friendly password manager look like if you remove the cloud completely?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Why I built it&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I wanted something:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;I could use on offline or air-gapped machines&lt;/li&gt;
&lt;li&gt;That didn’t depend on browser extensions&lt;/li&gt;
&lt;li&gt;Where I fully understood the threat model and tradeoffs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It’s been a good learning exercise around encryption, key management, and designing UX when all you have is a terminal.&lt;/p&gt;

&lt;p&gt;What I’m looking for&lt;/p&gt;

&lt;p&gt;I’m mostly looking for honest developer feedback:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Does the approach make sense?&lt;/li&gt;
&lt;li&gt;Are there obvious design or UX issues?&lt;/li&gt;
&lt;li&gt;Anything that feels unnecessary or missing?&lt;/li&gt;
&lt;li&gt;Would you ever use something like this, or is it solving a problem nobody has?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you’re curious, the repo is here:&lt;br&gt;
GitHub: &lt;a href="https://github.com/dinesh-git17/passfx" rel="noopener noreferrer"&gt;https://github.com/dinesh-git17/passfx&lt;/a&gt;&lt;/p&gt;

</description>
      <category>python</category>
      <category>opensource</category>
      <category>cli</category>
    </item>
    <item>
      <title>Looking for security feedback on a side project I’ve been building</title>
      <dc:creator>Dinesh Dawonauth</dc:creator>
      <pubDate>Mon, 22 Dec 2025 18:34:56 +0000</pubDate>
      <link>https://zeroday.forem.com/dineshgit17/looking-for-security-feedback-on-a-side-project-ive-been-building-2a7g</link>
      <guid>https://zeroday.forem.com/dineshgit17/looking-for-security-feedback-on-a-side-project-ive-been-building-2a7g</guid>
      <description>&lt;p&gt;I’ve been working on a small side project in my spare time and I’d love some honest security focused feedback from this community&lt;/p&gt;

&lt;p&gt;The project is PassFX - a terminal based password manager designed to work entirely offline. No cloud sync, no accounts, no browser extensions. Everything is encrypted locally and unlocked with a single master passphrase that never leaves the machine.&lt;/p&gt;

&lt;p&gt;The core idea is simple:&lt;br&gt;
reduce attack surface by removing the cloud entirely.&lt;/p&gt;

&lt;p&gt;I wanted something:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;I could use on an air-gapped or offline machine&lt;/li&gt;
&lt;li&gt;That didn’t rely on a browser extension or remote service&lt;/li&gt;
&lt;li&gt;Where I could reason clearly about the threat model&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This isn’t meant to replace enterprise solutions or compete with hosted managers. It’s more of an exploration into how minimal and auditable a password manager can be while still being usable day to day for developers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What I’m looking for feedback on&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I’m especially interested in thoughts around:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Cryptographic choices and key derivation approach&lt;/li&gt;
&lt;li&gt;Threat model assumptions (what I’m missing or underestimating)&lt;/li&gt;
&lt;li&gt;Secure storage practices on disk&lt;/li&gt;
&lt;li&gt;UX tradeoffs in terminal-only security tools&lt;/li&gt;
&lt;li&gt;Any obvious “don’t do this” red flags&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you’re curious, the repo is here:&lt;br&gt;
GitHub: &lt;a href="https://github.com/dinesh-git17/passfx" rel="noopener noreferrer"&gt;https://github.com/dinesh-git17/passfx&lt;/a&gt;&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>tools</category>
      <category>cryptography</category>
    </item>
    <item>
      <title>I don't trust password managers. So I built one.</title>
      <dc:creator>Dinesh Dawonauth</dc:creator>
      <pubDate>Mon, 22 Dec 2025 18:22:20 +0000</pubDate>
      <link>https://zeroday.forem.com/dineshgit17/i-dont-trust-password-managers-so-i-built-one-88k</link>
      <guid>https://zeroday.forem.com/dineshgit17/i-dont-trust-password-managers-so-i-built-one-88k</guid>
      <description>&lt;p&gt;Github: &lt;a href="https://github.com/dinesh-git17/passfx" rel="noopener noreferrer"&gt;PassFX Repo&lt;/a&gt;&lt;br&gt;
Webpage: &lt;a href="https://passfx.dineshd.dev" rel="noopener noreferrer"&gt;PassFX Landing Page&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After years of watching cloud first password managers get breached, acquired, or quietly change their terms of service, I decided the only one I could trust was one where I could read every line of code.&lt;/p&gt;

&lt;p&gt;Two months later: PassFX, a terminal password manager that never touches a network.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Problem
&lt;/h2&gt;

&lt;p&gt;Every single password manager I tested ultimately requested that I send all of my passwords to another company’s server and then trust them not to mess anything up.&lt;/p&gt;

&lt;p&gt;Although Cloud Sync is very easy to use, this greatly increases your risk.&lt;/p&gt;

&lt;p&gt;I’m a terminal user, but every terminal based password manager I used had a user interface from 1987 and/or would require you to learn obscure command line switches in order to perform the most basic functions. I was looking for security and a user interface that did not force me to close my computer.&lt;/p&gt;

&lt;h2&gt;
  
  
  What PassFX Is
&lt;/h2&gt;

&lt;p&gt;Local first, Offline Only, Password Manager with a &lt;a href="https://textual.textualize.io" rel="noopener noreferrer"&gt;Textual&lt;/a&gt; TUI. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Your Vault exists in ~/.passfx/ and NOWHERE ELSE&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Security Model: If you want to get your passwords, they have to be physically on your computer AND have your Master Password. NO NETWORK = NO REMOTE ATTACKS. NO CLOUD = NO THIRD PARTY BREACHES. NO RECOVERY = NO BACKDOOR.&lt;/p&gt;

&lt;p&gt;If you lose or FORGET your Master Password... GONE. Not a Bug; That's The Security Model.&lt;/p&gt;

&lt;p&gt;Storing: Email Credentials, Credit Cards, Phone PINs, API Keys, 2FA Recovery Codes, Encrypted Notes.&lt;/p&gt;

&lt;p&gt;Encryption: Fernet (AES-128-CBC + HMAC-SHA256), PBKDF2 with 480,000 Iterations, 256-Bit Salts. I did NOT create my own encryption — I READ THE RULES.&lt;/p&gt;

&lt;h2&gt;
  
  
  Who this is for:
&lt;/h2&gt;

&lt;p&gt;PassFX is right for you if you are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Comfortable working from the Terminal&lt;/li&gt;
&lt;li&gt;Want to know how your Password Manager works&lt;/li&gt;
&lt;li&gt;Are okay with “Forgot my password”=“I lost my data”&lt;/li&gt;
&lt;li&gt;Think “Zero Network Code” is reassuring and not limiting&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Paranoid Parts
&lt;/h2&gt;

&lt;p&gt;I spent more time on security testing than features. The test suite is 1.5x the production code:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Passwords excluded from all logs&lt;/li&gt;
&lt;li&gt;Vault files contain zero plaintext (binary inspection)&lt;/li&gt;
&lt;li&gt;File permissions verified on every write&lt;/li&gt;
&lt;li&gt;Constant-time password comparison&lt;/li&gt;
&lt;li&gt;PBKDF2 iterations locked at &lt;em&gt;exactly&lt;/em&gt; 480,000&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A PR that weakens security parameters fails CI. Not "might fail"—&lt;em&gt;will&lt;/em&gt; fail. Tests use exact equality, not minimums.&lt;/p&gt;

&lt;p&gt;Clipboard auto-clears after 15 seconds. Because "pasted my database password into Slack" is nobody's favorite story.&lt;/p&gt;

&lt;h2&gt;
  
  
  What It Doesn't Have
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Cloud sync&lt;/li&gt;
&lt;li&gt;Mobile app&lt;/li&gt;
&lt;li&gt;Browser extension&lt;/li&gt;
&lt;li&gt;Breach scanning&lt;/li&gt;
&lt;li&gt;Telemetry&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Every feature is attack surface. I wanted one thing: store credentials locally, encrypt properly, get out of the way.&lt;/p&gt;

&lt;h2&gt;
  
  
  The UI
&lt;/h2&gt;

&lt;p&gt;Terminal apps don't have to look like tax software. Cyberpunk aesthetic matrix green, deep blue-black, neon accents. Keyboard navigation, mouse support, modal dialogs, searchable lists.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;a&lt;/code&gt; to add, &lt;code&gt;e&lt;/code&gt; to edit, &lt;code&gt;d&lt;/code&gt; to delete, &lt;code&gt;c&lt;/code&gt; to copy, &lt;code&gt;Esc&lt;/code&gt; to go back.&lt;/p&gt;

&lt;p&gt;It's a password manager, not a puzzle game.&lt;/p&gt;

&lt;h2&gt;
  
  
  Feedback Welcome
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://github.com/dinesh-git17/passfx" rel="noopener noreferrer"&gt;GitHub repo&lt;/a&gt;. Security model in &lt;code&gt;SECURITY.md&lt;/code&gt;. Threat model is explicit about what it protects and what it doesn't.&lt;/p&gt;

&lt;p&gt;Find a bug? Open an issue. Security vulnerability? Report privately via GitHub Security Advisories or &lt;code&gt;security@dineshd.dev&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;PRs are welcome as long as they don't weaken security. The tests will tell you if you tried.&lt;/p&gt;

&lt;h2&gt;
  
  
  Install
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;pip &lt;span class="nb"&gt;install &lt;/span&gt;passfx
passfx
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;First run creates your vault. Make the master password strong. There's no recovery, and that's the point.&lt;/p&gt;




&lt;p&gt;Your passwords belong to you. Not to a company. Not to a cloud.&lt;/p&gt;

&lt;p&gt;If that resonates, &lt;a href="https://github.com/dinesh-git17/passfx" rel="noopener noreferrer"&gt;check it out&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>security</category>
      <category>python</category>
      <category>opensource</category>
      <category>cli</category>
    </item>
  </channel>
</rss>
